Главная
Study mode:
on
1
Intro
2
What is the Killchain
3
Common threats
4
Attack Killchain
5
Recon
6
Mitigation
7
Delivery
8
Defensive medications
9
Default application associations
10
Flag malicious file types
11
Exploitation
12
Group Policy
13
Microsoft Office
14
Floss
15
Ransomware
16
Defensive Mitigation
17
Monitoring Learning
18
Command and Control
19
DNS Sinkhole
20
Threat Lists
21
DJs
22
Splash Page
23
Honey Directory
24
Bloodhound
25
Powershell Script
26
Responder
27
Passwords
28
Factor Auth
29
Splunk
30
Bloodhound Demo
31
Weaponization
32
exploitation phase
33
privilege escalation
34
Amanda Berlin
Description:
Explore the intricacies of cybersecurity and learn how to disrupt the attack killchain in this comprehensive conference talk from AIDE 2018. Delve into common threats, attack methodologies, and defensive strategies across various stages of the killchain. Gain insights on reconnaissance mitigation, delivery defense mechanisms, exploitation prevention techniques, and effective monitoring practices. Discover tools and tactics like DNS sinkholes, threat lists, honeypots, and Bloodhound for enhanced security. Examine the weaponization and privilege escalation phases, and understand the importance of multi-factor authentication and advanced monitoring solutions like Splunk. Join Amanda Berlin as she provides a detailed walkthrough of cybersecurity concepts, practical demonstrations, and actionable defensive measures to fortify your organization against evolving cyber threats.

Disrupting the Killchain

Add to list
0:00 / 0:00